Release date:
2026-01-19 15:09:29 UTC
Description:
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() {CVE-2023-53803}
- md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445}
- ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- dm cache: free background tracker's queued work in {CVE-2023-53765}
- drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280,CVE-2022-50440}
- vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618}
- ice: set tx_tstamps when creating new Tx rings via ethtool {CVE-2022-50710}
- sctp: avoid NULL dereference when chunk data buffer is {CVE-2025-40240}
- ip6_vti: fix slab-use-after-free in decode_session6 {CVE-2023-53821}
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- ext4: add bounds checking in get_max_inline_xattr_value_size() {CVE-2023-53285}
- md/raid10: fix null-ptr-deref in raid10_sync_request {CVE-2023-53832}
- dm flakey: fix a crash with invalid table line {CVE-2023-53786}
- wifi: mt7601u: fix an integer underflow {CVE-2023-53679}
- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode {CVE-2022-50638}
- ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
- ext4: add helper to check quota inums
- ext4: fix bug_on in __es_tree_search caused by bad quota inode
- quota: Factor out setup of quota inode
- USB: usbtmc: Fix direction for 0-length ioctl control messages {CVE-2023-53761}
- ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer {CVE-2023-53395}
- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] {CVE-2024-46815}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989}
- nvmet: avoid potential UAF in nvmet_req_complete() {CVE-2023-53116}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- vt: Clear selection before changing the font {CVE-2022-49948}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() {CVE-2022-49826}
- ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix {CVE-2022-49503}
- selinux: Add boundary check in put_entry() {CVE-2022-50200}
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails {CVE-2023-53307}
- RDMA/mlx5: Return the firmware result upon destroying QP/RQ {CVE-2023-53286}
- sched/fair: Don't balance task to its current running CPU {CVE-2023-53215}
- powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue {CVE-2022-50366}
- ACPI: tables: FPDT: Don't call acpi_os_map_memory() on invalid phys address {CVE-2022-50320}
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() {CVE-2022-50881}
- slcan: Don't transmit uninitialized stack data in padding {CVE-2020-11494}
- media: dvb-frontends: avoid stack overflow warnings with clang {CVE-2024-27075}
- PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free {CVE-2023-53446}
- cifs: Fix warning and UAF when destroy the MR list {CVE-2023-53427}
- sctp: fix a potential overflow in sctp_ifwdtsn_skip {CVE-2023-53372}
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter {CVE-2023-53357}
- lwt: Fix return values of BPF xmit ops {CVE-2023-53338}
- ubi: ensure that VID header offset + VID header size <= alloc, size {CVE-2023-53265}
- ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423}
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411}
- ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315}
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace {CVE-2023-54286}
Updated packages:
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:15d658713efc23c88037a8d4395ba0a425af7a3172b42d8eb8d425bec7cc8c11
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:c0ea860ec59fddd7c53a5ea86125efe5161666aa1e2e7524b7dd5c124d119570
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:d4f21de2c569e64b2293f45cabeafe52da153896fb0e78653591e7a57f6b6d2f
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:d697ab4f729745836ac97d6cae8bda6df5d61988e37ddab1908408cd104747d9
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:9bc9cc0e5b4a1c6f7c723e6bafc6d365fd8a9f0389089803bd636b7dba6e49f6
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:77c6155d1ffea52810be069f09eba439eb895585764232c834042e829601adec
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:86e544b75e16ec5091528a4c7a5b599e13560626a5470656e0bfe4ca9f78e247
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:d2b2a4c656ced8b4c84a12b7f24c2edac03bdc0681f8afe3423e30d4d8f4ca6d
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:35106c5819e92570c30848315ab99718dcfdd1ebcdbf1bbc5d55ec3a86d908f3
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:616202862aef8e46e0bc0e1697d964330242e23e5b3981271e30d6f86b4af208
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:950d0bbc6b2d6b92ea58ed4f55f09b2da592d83c6a243d4b74191329d9913622
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:174397889993e69c53502f956ab52f1f4a33b08ab14cbbe583160d72aae363db
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:c6f9f79353bda094171fdb3470b68a8bbb9f91e043fedac545c5ba10950f1842
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:9906610015569466c7e05aedb90ad076f6f59465c1bd063a2b73a5e8bce66f39
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:528f4844ba7ee90bb019de7f8af075933fea7ed0d2f16aa4de92c4160a83362e
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:ce9b19598a581653316752ebbacf376d735531fa34b212591646b3cb3d74fc0f
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:5395525aed59570f8291658821272d663f5f0793b1d03111880d397bd9b5ca5c
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:2f9d899dcef8665d3e2167471237d4ebb3c1feee76e428c72da62437f276ae4c
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:05cc1da567b80a8e9647de36a4bdaf39e41cb4b9b889d069e8c2cc534dec80a3
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:1c73eb012cc0a4b93b6bf0f5900e57181d9c577ecadcfe5739e1ecbad38707ee
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:5ffd19fa3c87dc987e967b0678f76fb19c40bd2014d8e9ac0f55303fb0ddb144
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
sha:af30c1be815c0a5216fe2dffcb2904879038d551f725b10f58788a86a52337ba
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.